-
2
-
-
33646831908
-
Trustguard: Countering vulnerabilities in reputation management for decentralized networks
-
May
-
M. Srivatsa, L. Xiong, and L. Liu, "Trustguard: Countering vulnerabilities in reputation management for decentralized networks," Proc. of WWW'05, May 2005.
-
(2005)
Proc. of WWW'05
-
-
Srivatsa, M.1
Xiong, L.2
Liu, L.3
-
4
-
-
34548328719
-
Bayesian network trust model in peer-to-peer networks
-
Y. Wang and J. Vassileva, "Bayesian network trust model in peer-to-peer networks," Proc. of AP2PC03, 2003.
-
(2003)
Proc. of AP2PC03
-
-
Wang, Y.1
Vassileva, J.2
-
7
-
-
0042209739
-
A micropayment scheme encouraging collaboration in multi-hop cellular networks
-
M. Jakobsson, J. Hubaux, and L. Buttyan, "A micropayment scheme encouraging collaboration in multi-hop cellular networks," Proc. of Financial Crypto'03., 2003.
-
(2003)
Proc. of Financial Crypto'03
-
-
Jakobsson, M.1
Hubaux, J.2
Buttyan, L.3
-
9
-
-
34548339021
-
Sip: A secure incentive protocol against selfishness in mobile ad hoc networks
-
March
-
Y. Zhang, W. Lou, and Y. Fang, "Sip: a secure incentive protocol against selfishness in mobile ad hoc networks," Proc of WCNC'04, March 2004.
-
(2004)
Proc of WCNC'04
-
-
Zhang, Y.1
Lou, W.2
Fang, Y.3
-
10
-
-
8344233542
-
A game theoretic approach to provide incentive and service differentiation in p2p networks
-
June
-
J. C. L. TB. Ma, Sam CM. Lee and D. K. Yau, "A game theoretic approach to provide incentive and service differentiation in p2p networks," Proc. of ACM SIGMETRICS/PERFORMANCE, June 2004.
-
(2004)
Proc. of ACM SIGMETRICS/PERFORMANCE
-
-
Ma, J.C.L.T.1
Lee, S.C.M.2
Yau, D.K.3
-
11
-
-
0033907852
-
Removing the financial incentive to cheat in micropayment schemes
-
January
-
L. Buttyn, "Removing the financial incentive to cheat in micropayment schemes," IEE Electronics Letters, Vol. 36 No. 2, pp.132-133, January 2002.
-
(2002)
IEE Electronics Letters
, vol.36
, Issue.2
, pp. 132-133
-
-
Buttyn, L.1
-
13
-
-
3242802867
-
Robust incentive techniques for peer-to-peer networks
-
M. Feldman, K. Lai, I. Stoica, and J. Chuang, "Robust incentive techniques for peer-to-peer networks," in ACM Electronic Commerce., 2004.
-
(2004)
ACM Electronic Commerce
-
-
Feldman, M.1
Lai, K.2
Stoica, I.3
Chuang, J.4
-
14
-
-
0034782005
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
August
-
I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan, "Chord: A scalable peer-to-peer lookup service for internet applications," Proc. of ACM SIGCOMM'01, pp. 149-160, August 2001.
-
(2001)
Proc. of ACM SIGCOMM'01
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, F.4
Balakrishnan, H.5
-
15
-
-
0001983901
-
A scalable content addressable network
-
August
-
S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, "A scalable content addressable network," Proc. of ACM SIGCOMM'01, August 2001.
-
(2001)
Proc. of ACM SIGCOMM'01
-
-
Ratnasamy, S.1
Francis, P.2
Handley, M.3
Karp, R.4
Shenker, S.5
-
16
-
-
0003007594
-
Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems
-
November
-
A. Rowstron and P. Druschel, "Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems," Proc. of Middleware'01, November 2001.
-
(2001)
Proc. of Middleware'01
-
-
Rowstron, A.1
Druschel, P.2
-
17
-
-
2442603590
-
Secure routing for structured peer-to-peer overlay networks
-
M. Castro, P. Drushel, A. Ganesh, A. Rowstron, and D. Wallach, "Secure routing for structured peer-to-peer overlay networks," Proc. ofOSDI'02, 2002.
-
(2002)
Proc. ofOSDI'02
-
-
Castro, M.1
Drushel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.5
|